Query Result Set
Skip Navigation Links
   ActiveUsers:875Hits:18940411Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
HUMAN INTELLIGENCE (14) answer(s).
 
SrlItem
1
ID:   191087


Between a rock and a hard place: precarious state of a double agent during the cold war / Braat, Eleni; Jong, Ben de   Journal Article
Braat, Eleni Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract While scholarly literature has paid attention to human intelligence professionalism from the perspective of the agent handler, we know relatively little about the precarious positions in which (double) agents often find themselves and what their ensuing needs from their handlers consist of. This article suggests that (double) agents desire a reciprocal, affect-based relationship with their handlers, involving trust and gratitude, more than just a negotiated relationship based on (financial) agreements. This article explains the importance of such a relationship. The main source of this research consists of original, in-depth oral history interviews with former double agent “M.” He operated from the 1960s through the 1990s for the Dutch Security Service and the Central Intelligence Agency against the East German Ministerium für Staatssicherheit. The article analyzes the varying degrees of appreciation that these services showed for his work, and it investigates their consequences on the psychological well-being of the double agent.
        Export Export
2
ID:   158767


Can a Tunnel become a double agent—for the Soviets? / Macrakis, Kristie   Journal Article
Macrakis, Kristie Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
3
ID:   074143


Defense HUMINT needs technology, too: trench coats have given way to optical collectors / Ackerman, Robert K   Journal Article
Ackerman, Robert K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Key Words Intelligence  Human Intelligence  HUMINT 
        Export Export
4
ID:   073463


Developing junior military intelligence leaders in a time of wa / Griswold, John C; Colon, Daniel L   Journal Article
Griswold, John C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
5
ID:   192258


Hezbollah and Hamas’s main platforms for recruiting and handling of human sources after 2006 / Flamer, Netanel   Journal Article
Flamer, Netanel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Like any military power, violent non-state actors operate intelligence, including human intelligence (HUMINT), to suit their needs. The article aims to explore the primary methods used by Hezbollah and Hamas in recruiting and handling human sources since the mid-2000s, illustrating each method with several case studies. An examination of these methods may shed light on a significant aspect of the intelligence war waged by Hezbollah and Hamas against Israel. In addition, analysis of these organizations’ HUMINT activity demonstrates how violent non-state actors, which are inherently the weaker side in their asymmetric warfare against advanced state entities, can compensate for their disadvantages and conduct effective intelligence activity. The article reveals how the clever and creative use of HUMINT maximizes its benefits for violent non-state actors.
Key Words Israel  Hamas  Asymmetric Warfare  Hezbollah  Non-State Actors  Human Intelligence 
        Export Export
6
ID:   168284


Human compatible: artificial intelligence and the problem of control / Russell, Stuart 2019  Book
Russell, Stuart Book
0 Rating(s) & 0 Review(s)
Publication Great Britain, Allen Lane, 2019.
Description x, 336p.hbk
Standard Number 9780241335208
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059723006.301/RUS 059723MainOn ShelfGeneral 
7
ID:   166779


Indian spies inside Pakistan: South Asian human intelligence across borders / Shaffer, Ryan   Journal Article
Shaffer, Ryan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines India’s historical efforts to spy inside Pakistan from the mid-1960s to the early 1970s. It draws from memoirs of notable Indian spies who were jailed for espionage in Pakistan and spy ‘fiction’ written by former Indian intelligence and military officers who allege their writing is based on actual cases. The article highlights commonalities among Indian spies using the words of Indian officers to better understand human intelligence efforts inside Pakistan. It finds that Indian spies in these books have initially been Hindus or from multi-religious families, from the Indian-Pakistan border and have been poorly treated by the Indian government and its intelligence services.
        Export Export
8
ID:   109553


Intelligence adaptation: the Bin Laden raid and its consequences for US strategy / Cobb, Adam   Journal Article
Cobb, Adam Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
9
ID:   111612


Intelligence exchange through interIntel / Wippl, Joseph W   Journal Article
Wippl, Joseph W Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
10
ID:   106853


Operation Geronimo: lessons for India / Menon, K B   Journal Article
Menon, K B Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
11
ID:   140497


Reading Lolita in langley: the unreliable narrator as a device to evaluate intelligence credibility / Manjikian, Mary   Article
Manjikian, Mary Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Current methods of ascertaining the reliability of human intelligence focus predominantly on evaluating the reliability of sources. More leverage might be achieved through considering the reliability of narratives constructed or furnished by those sources. Lessons can be drawn from literary theory which examines the creation and reading of unreliable and untrustworthy narratives. A narrative can be unreliable and/or untrustworthy, even when the informant appears to be cooperating in furnishing information, due to his often unconscious biases or limitations in understanding or retelling the tale.
        Export Export
12
ID:   120430


Security force collusion in Northern Ireland 1969–1999 / Cochrane, Mark   Journal Article
Cochrane, Mark Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract In order to thwart and prevent terrorism the State is compelled to use all of the covert capabilities at its disposal in order to protect the society it serves. One of its most effective weapons is the use of human intelligence. Often acquired through secret relationships with terrorists or those with the ability to access preemptive intelligence. This important work is contentious for any democratic society as such practices and relationships, should they become known, inevitably beg the question-How far is it permissible for the State to go? A case study of State efforts to combat terrorism in Northern Ireland presents the moral, ethical, and legal dilemmas encountered and the propaganda opportunity such activity presents its detractors and critics. This article will identify key aspects related to the intelligence war and the development and creation of the concept of "collusion," a subjective issue, and one that has no legal definition.
        Export Export
13
ID:   116168


Spies without borders? western intelligence liaison, the Tehran / Munton, Don; Matejova, Miriam   Journal Article
Munton, Don Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Iran's Islamic Revolution and the takeover of the United States embassy in Tehran in November 1979 was America's and the West's first encounter with contemporary radical Islam. It prompted substantial intelligence cooperation amongst Western countries. Their liaison included not only the collection of human intelligence (Humint) but also an effort to protect six Americans who had escaped becoming hostages, and then a successful covert exfiltration operation to secure their escape from Iran. Canadian embassy staff, assisted by CIA experts, mounted this operation in late January 1980. We use the Iranian Revolution and occupation of the American embassy in Tehran both to flesh out the nature of contemporary Western Humint cooperation and to highlight the intelligence activities, including international intelligence liaison, of Western foreign ministries.
        Export Export
14
ID:   127455


Tinker, tailor, leaker, spy / Gioe, David V   Journal Article
Gioe, David V Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract BETWEEN THE TRIAL of Chelsea (formerly known as Bradley) Manning and the revelations of Edward Snowden, the debate regarding the leakers and their information has focused primarily on the balance between liberty and security, or between government transparency and secrecy. This is a necessary, even overdue, discussion. But it is also important to reflect upon the lasting damage these unauthorized disclosures will have on future U.S. intelligence collection.
Key Words National Security  Security  United States  Spy  Human Intelligence  Intelligence Collection 
Tinker  Tailor  Leaker 
        Export Export